CONCERTIUM CYBERSECURITY & IT BLOG
How to Protect Yourself from Social Engineering Attacks: 7 Tips from Concertium
Social Engineering Attacks: How to Protect Yourself Cyber threats have become more advanced and dangerous as technology encroaches on all facets of our lives. Among these dangers, social engineering is one of the trickiest and riskiest strategies bad actors use....
5 Benefits of Outsourcing Cybersecurity
One of the most critical services that companies benefit from is the protection and monitoring of networks and servers by cybersecurity companies. When a company opts to outsource any work, it can receive the best quality of work from other industry experts. When it...
5 Ways SMEs Benefit from Managed Detection & Response (MDR)
Five Ways SMEs Benefit from Managed Detection & Response (MDR) The modern mid-sized organization generates massive amounts of user and system activity data that results in an avalanche of alerts. How do you keep pace with identifying what’s a real threat?...
HIPAA Compliance: Covered Entities (CEs) & Business Associates (BAs)
HIPAA Compliance: Covered Entities (CEs) & Business Associates (BAs)Contents of the Blog: Cybersecurity in Healthcare, At a Glance The Purpose of HIPAA Compliance Types of Healthcare Organizations: CEs and BAs Unique Challenges for BAs Consequences of...
6 Steps That Help You Qualify for Cyber Insurance
Protecting your business from cyber threats is paramount to organizations across industries today. One effective strategy is obtaining cyber insurance, which provides financial protection in the event of a cyber incident. However, to secure coverage, businesses must...
10 Ransomware Defense Strategies to Deploy in 2023
Ransomware attacks have advanced significantly since the first reported incident more than 30 years ago. As today's attackers utilize more sophisticated delivery methods and leverage readily available malware to target vulnerable organizations for financial gain, it's...
MDR vs EDR vs SIEM: Which One Is Best for Your Business?
As cyber threats continue to evolve and become more sophisticated, organizations must ensure they have a robust cybersecurity solution in place to protect sensitive data. Managed detection and response (MDR), endpoint detection and response (EDR), and security...
Ransomware Trends to Watch in 2023
Ransomware attacks continue to grow in sophistication and effectiveness. The reported incidents in 2022 were much more damaging and costly to address than ever before. According to IBM’s data breach report for 2022, the share of breaches caused by ransomware increased...
From cost center to cost mitigation
What's the biggest thing holding you back from making cybersecurity a priority? For most CISOs and security executives, it's the fact that cybersecurity is perceived as a cost center rather than part of an overall cost mitigation strategy. Cost Center Mentality...
Is a panicked board asking the right cybersecurity questions?
When it comes to cybersecurity, it’s not uncommon to hear concerns on a feast-or-famine basis. If you’ve avoided major incidents, you’ll hear, Why so worried – we haven’t had a breach so we have a handle on security, right? Why are we spending so much? But when a...
Suddenly CISO Series: Avoiding the post-merger hangover
Mergers and acquisitions create huge growth opportunities — but, as with any good thing, they come with transition challenges, especially in security. Pre-merger planning activities are often focused within strategic, operational, and legal teams, while other groups...
The case for cloud-hosted virtual desktops
Cloud-Hosted Virtual Desktops are part of a cutting-edge technology approach that presents companies with many advantages in terms of cost, speed, sustainability, and more — but particularly in the critical area of cybersecurity. But first, what is a Cloud-Hosted...
Cyber security concerns for networks with mobile devices
For businesses, maintaining mobile device cybersecurity involves a holistic, strategic approach that goes well beyond protection for the compact pieces of equipment we might think of first, like cell phones, tablets and personal digital assistants (PDAs). It also...
Cybersecurity roles for board members
Cyber-threats and data breaches can cause major disruptions to large and small companies. Today, businesses are being forced to adapt. What used to be the standard — relying on modern firewalls and insulating key corporate functions — has given way to a far more...
Don’t do this! Cybersecurity tips
Electronic scams — including those propagated by email or websites — can cause major headaches (or worse) for companies and individuals. Especially during the holidays, there seems to be an uptick in scammers attempting to prey on the increase of online payments. For...